Skip to main content

Hierarchical RFID Tag Ownership and Transfer in Supply Chains

  • Conference paper
E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life (WEB 2011)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 108))

Included in the following conference series:

Abstract

A majority of RFID tag applications are related to tracking and tracing of the RFID-tagged items throughout supply chains. Tracking and tracing require communication with the tag to identify and authenticate the tag. While identification can be readily accomplished in the absence of adversaries, identification and authentication in the presence of adversaries is not a trivial task. This process is exacerbated when the tagged item transfers ownership as it passes through a supply chain. Recent developments in cryptography facilitates accomplishing these in a seamless manner. We consider a specific scenario in supply chains where ownership of RFID-tagged items follow a hierarchical relationship. We present an ownership transfer protocol for this scenario and briefly consider its security properties. The proposed protocol can be used to seamlessly manage hierarchical ownership transfers in supply chains.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brands, S., Chaum, D.: Distance Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994)

    Google Scholar 

  2. Desmedt, Y.: Major Security Problems with the ‘Unforgeable’ (Feige)-Fiat-Shamir Proofs of Identity and How to Overcome Them. In: Proceedings of the Securicom 1988, 6th Worldwide Congress on Computer and Communications Security and Protection, pp. 147–159 (1988)

    Google Scholar 

  3. Hering, J.: The BlueSniper ‘rifle’. Presented at 12th DEFCON, Las Vegas (2004)

    Google Scholar 

  4. Juels, A.: Yoking-Proofs for RFID Tags. In: Proceedings of the First International Workshop on Pervasive Computing and Communication Security (PerSec), pp. 138–143. IEEE Press (2004)

    Google Scholar 

  5. Kapoor, G., Piramuthu, S.: Single RFID Tag Ownership Transfer Protocols. IEEE Transactions on Systems, Man, and Cybernetics - Part C (2011)

    Google Scholar 

  6. Kapoor, G., Zhou, W., Piramuthu, S.: Multi-item and Multi-owner RFID Ownership Transfer in Supply Chains. Decision Support Systems (2011)

    Google Scholar 

  7. Kfir, Z., Wool, A.: Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems. In: Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), pp. 47–58 (2005)

    Google Scholar 

  8. Meiller, Y., Bureau, S., Zhou, W., Piramuthu, S.: Adaptive Knowledge-based System for Health Care Applications with RFID-generated Information. Decision Support Systems 51(1), 198–207 (2011)

    Article  Google Scholar 

  9. Piramuthu, S.: RFID Mutual Authentication Protocols. Decision Support Systems 50(2), 387–393 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhou, W., Yoon, E.J., Piramuthu, S. (2012). Hierarchical RFID Tag Ownership and Transfer in Supply Chains. In: Shaw, M.J., Zhang, D., Yue, W.T. (eds) E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life. WEB 2011. Lecture Notes in Business Information Processing, vol 108. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29873-8_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29873-8_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29872-1

  • Online ISBN: 978-3-642-29873-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics